Cybercriminals Leak Millions of Records in “Free Leakmas” Campaign During the Holiday Season

The holiday season is usually a time of joy and celebration, but for cybercriminals, it presented an opportunity to carry out their nefarious activities. In the days leading up to Christmas, a staggering 50 million records containing sensitive personal information were leaked by these threat actors. These leaks, primarily found on the Dark Web, were labeled “Free Leaksmas,” indicating that the criminals were sharing their data as a gesture of mutual gratitude among their ilk.

“Free Leaksmas” campaign on the Dark Web

The Dark Web served as the platform for cybercriminals to exchange and share compromised data during the holiday season. The “Free Leaksmas” campaign demonstrated a peculiar form of camaraderie among these threat actors. It is believed that by sharing their stolen data, they were expressing gratitude towards one another and establishing an environment of trust within their criminal network. As part of the campaign, underground shops offering compromised accounts on online banking and ecommerce platforms even provided substantial discounts, with markdowns reaching up to 40%.

Data dumps from various breaches

Several major data breaches contributed to the “Free Leaksmas” campaign, resulting in significant record leaks. One of the most prominent dumps came from a breach at Peruvian telecom provider Movistar, where a staggering 22 million records containing customer phone numbers and identification numbers were compromised. This breach is concerning as it exposes a vast amount of personal information that could potentially be exploited for various malicious purposes.

In addition to the Movistar breach, other notable Leaksmas datasets emerged from breaches at a Vietnamese fashion retailer and a French company. Both of these breaches yielded millions of records, further fueling concerns about the extent of personal data available to cybercriminals.

Revisiting older incidents

Interestingly, some of the leaked data appeared to originate from older incidents that had resurfaced. One such incident was the rumored breach of the Swedish fintech company Klarna in 2022. It is clear that cybercriminals are not only focused on recent breaches but also revisiting past incidents to exploit any remaining vulnerabilities and retrieve valuable data.

Notable threat actors involved

Several known threat actor groups have been identified as participating in the “Free Leaksmas” campaign. One such group is SeigedSec, a pro-Iranian entity that has previously targeted critical infrastructure and industrial control systems environments in Israel. Their involvement in sharing compromised data during the holiday break raises concerns over potential future attacks on critical systems.

Another group involved in the Leaksmas campaign is the hacktivist alliance known as the “Five Families.” This group claimed responsibility for stealing records from a large Chinese clothing store due to its alleged abusive labor practices and government connections. The motivations behind their actions highlight the intersection between cybercrime and activism.

Discounts and Focus on Stolen Credit Card Data

As digital identity remains a primary focus for cybercriminals, those selling stolen credit card data and related services offer attractive discounts to entice new buyers. Cybercriminals recognize the lucrative nature of stolen credit card information and the potential for financial gain. By offering discounts, they seek to expand their customer base and increase the demand for stolen data.

The “Free Leaksmas” campaign conducted by cybercriminals during the holiday season resulted in a massive influx of leaked personal data. The collaboration and data sharing observed among these threat actors signifies the existence of a robust criminal network. With notable threat actors and the abundance of compromised accounts and credit card information, the importance of data security cannot be stressed enough. As we move forward, it is crucial for individuals and organizations to remain vigilant and implement robust cybersecurity measures to protect against such breaches and safeguard sensitive information.

Explore more

Is Fairer Car Insurance Worth Triple The Cost?

A High-Stakes Overhaul: The Push for Social Justice in Auto Insurance In Kazakhstan, a bold legislative proposal is forcing a nationwide conversation about the true cost of fairness. Lawmakers are advocating to double the financial compensation for victims of traffic accidents, a move praised as a long-overdue step toward social justice. However, this push for greater protection comes with a

Insurance Is the Key to Unlocking Climate Finance

While the global community celebrated a milestone as climate-aligned investments reached $1.9 trillion in 2023, this figure starkly contrasts with the immense financial requirements needed to address the climate crisis, particularly in the world’s most vulnerable regions. Emerging markets and developing economies (EMDEs) are on the front lines, facing the harshest impacts of climate change with the fewest financial resources

The Future of Content Is a Battle for Trust, Not Attention

In a digital landscape overflowing with algorithmically generated answers, the paradox of our time is the proliferation of information coinciding with the erosion of certainty. The foundational challenge for creators, publishers, and consumers is rapidly evolving from the frantic scramble to capture fleeting attention to the more profound and sustainable pursuit of earning and maintaining trust. As artificial intelligence becomes

Use Analytics to Prove Your Content’s ROI

In a world saturated with content, the pressure on marketers to prove their value has never been higher. It’s no longer enough to create beautiful things; you have to demonstrate their impact on the bottom line. This is where Aisha Amaira thrives. As a MarTech expert who has built a career at the intersection of customer data platforms and marketing

What Really Makes a Senior Data Scientist?

In a world where AI can write code, the true mark of a senior data scientist is no longer about syntax, but strategy. Dominic Jainy has spent his career observing the patterns that separate junior practitioners from senior architects of data-driven solutions. He argues that the most impactful work happens long before the first line of code is written and